Beruflich Dokumente
Kultur Dokumente
Solaris
5.0
N18530F
Veritas Storage Foundation and High Availability Solutions Getting Started Guide
Copyright 2006 Symantec Corporation. All rights reserved. Storage Foundation and High Availability Solutions 5.0 Symantec, the Symantec logo, Veritas, and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com
Technical support
For technical assistance, visit http://support.veritas.com and select phone or email support. Select a product to use the Knowledge Base Search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and the customer email notification service. If you encounter an error when using a product, include the error number preceding the message when contacting Technical Services. You can also use the error number to search for information in TechNotes or documents on the website.
Contents
Whats included ..................................................................................................... 8 How to license Symantec products ..................................................................... 9 Operating system requirements ........................................................................10 Software disc contents ........................................................................................11 Mounting a software disc ...................................................................................13 Installation methods ...........................................................................................13 Using the product installer ........................................................................14 Installation options .....................................................................................16 Install required packages ....................................................................16 Install required and optional packages ............................................16 Install additional packages .................................................................16 Command line installation .........................................................................17 Command line options ........................................................................18 Log files ..................................................................................................20 Additional product information ........................................................................22 Locating and displaying documentation ..................................................22 Ordering documents ....................................................................................22 Documentation feedback ............................................................................22 Installing language products .....................................................................23 About Veritas products .......................................................................................24 Component software ...................................................................................24 Symantec Product Authentication Service ......................................24 Storage Foundation Management Server ........................................24 Cluster Management Console ............................................................24 Web Server for Storage Foundation Host Management ................25 Veritas Cluster Server .................................................................................26 Installation overview ...........................................................................26 About this product ...............................................................................26 Veritas high availability agents .................................................................27 Installation overview ...........................................................................27 About this product ...............................................................................27 Supported high availability agents ...................................................28 Veritas Volume Replicator .........................................................................29 Installation overview ...........................................................................29 About this product ...............................................................................29 Veritas Storage Foundation .......................................................................30 Installation overview ...........................................................................30
6 Contents
About this product ............................................................................... 30 Veritas Storage Foundation Basic ............................................................. 32 About this product ............................................................................... 32 Limited deployment ............................................................................ 32 Licensing ............................................................................................... 32 Technical support ................................................................................ 33 Installation overview .......................................................................... 33 Upgrade paths ...................................................................................... 33 Veritas Storage Foundation for DB2 ......................................................... 34 Installation overview .......................................................................... 34 About this product ............................................................................... 34 Veritas Storage Foundation for Oracle .................................................... 35 Installation overview .......................................................................... 35 About this product ............................................................................... 35 Veritas Storage Foundation for Sybase .................................................... 36 Installation overview .......................................................................... 36 About this product ............................................................................... 36 Storage Foundation Cluster File System .................................................. 37 Installation overview .......................................................................... 37 About this product ............................................................................... 37 Storage Foundation for Oracle RAC .......................................................... 38 Installation overview .......................................................................... 38 About this product ............................................................................... 38 Configuring SSH or RSH before installing products ...................................... 39 Enabling SSH ................................................................................................ 39 Enabling and Disabling RSH ...................................................................... 42 Disc directory structure ...................................................................................... 43 Known issues ........................................................................................................ 44 Permissions on the /etc directory change during product installation 44
Getting Started
Veritas Cluster Server on page 26 Veritas high availability agents on page 27 Veritas Volume Replicator on page 29 Veritas Storage Foundation on page 30 (includes Veritas File System and Veritas Volume Manager) Veritas Storage Foundation for DB2 on page 34 Veritas Storage Foundation for Oracle on page 35 Veritas Storage Foundation for Sybase on page 36 Storage Foundation Cluster File System on page 37 Storage Foundation for Oracle RAC on page 38
Note: To obtain and install Storage Foundation Basic, see Veritas Storage Foundation Basic on page 32 for information on product availability.
Whats included
To familiarize yourself with a Veritas product and its installation procedure, do the following:
Read How to license Symantec products on page 9. You must obtain a license key before installing any Veritas product. Read Installation methods on page 13 for instructions on installing your Veritas product. The Symantec products contained in this kit are listed under Storage Foundation and High Availability Solutions on page 7. Go to the section describing your product to find the location of the product release notes and installation guide. Read the release notes and installation guide before installing a product. Review Known issues on page 44 before installing any product for information on software issues that may affect all products in this release. Read Additional product information on page 22 for a description of other features in the Storage Foundation and High Availability Solutions product kit.
Storage Foundation and High Availability Solutions How to license Symantec products
Even though other products are included on the enclosed software discs, you can only install the Symantec software products for which you have purchased a license.
11
Veritas Disc
Product disc
Contents
Veritas Cluster Server Veritas Cluster Server Central Management Console Veritas File System Veritas Volume Manager Veritas Volume Replicator Veritas Storage Foundation Veritas Storage Foundation for DB2 Veritas Storage Foundation for Oracle Veritas Storage Foundation for Sybase Veritas Storage Foundation Cluster File System Veritas Storage Foundation for Oracle RAC (Real Application Clusters) Symantec Product Authentication Service
Documentation The Veritas documentation disc provides searchable, HTML disc documentation for each product in this release. Printable PDF documents are also included on the disc. All documentation is organized by product groups. The documents are also on the disc in PDF format under the product directories. You can view and print selected PDF files using Acrobat Reader. If you insert the documentation disc in a Microsoft Windows system drive, the autorun feature displays the page with information on how to search. To use the documentation disc on a Solaris system, mount the disc (see Mounting a software disc on page 13). Review the documentation disc README in the top-level directory.
Veritas Disc
Language discs
Contents
Note: Not available in every release. Veritas products are partially or wholly localized in Japanese, French, and Simplified Chinese. If you purchase a Veritas non-English language product, a language disc and a language documentation disc are included in the Storage Foundation and High Availability Solutions kit. The language disc contains localized packages that must be installed for Veritas products to operate in the supported locale. The language documentation disc contains translated product guides (see Documentation disc above).
Note: Not available in every release. If you have a Veritas Storage Foundation and High Availability Solutions maintenance release, the kit contains a disc with software patches or updated packages. After installing the product, mount the maintenance software disc. Go to the appropriate product directory and review the release notes for upgrade instructions.
13
Installation methods
There are two ways to install Veritas products:
Using the product installer Invoking product installation scripts from the command line
See the product installation guides for information on the other installation methods. Note: Do not make /opt a VxFS file system. There are also two installation modes:
You install products remotely using SSH or RSH. For shell configuration information, see Configuring SSH or RSH before installing products on page 39.
# /opt/VRTS/bin/vxsvcctrl stop
To use the product installer 1 Locate the name of the product to install on the product software disc. Insert the disc into a drive attached to your system and mount it (see Mounting a software disc on page 13). To change to the cdrom directory, type the following command: # cd /cdrom/cdrom0 From the cdrom directory, do one of the following. To invoke the installer script using SSH (recommended), type the following command: # ./installer To invoke the installer script using RSH, type the following command: # ./installer -rsh
2 3
15
The product installer displays a list of products and their installation and licensing status as shown in the example below. A list of tasks to perform follows the product status:
Storage Foundation and High Availability Solutions 5.0 Symantec Product Version Installed Licensed =============================================================== Veritas Cluster Server 4.1 yes Veritas Volume Replicator no no Veritas Storage Foundation 4.1 yes Veritas Storage Foundation for Oracle no no Veritas Storage Foundation Cluster File System no no Veritas Storage Foundation for Oracle RAC no no I) L) U) Q) Install/Upgrade a Product License a Product Uninstall a Product Quit C) P) D) ?) Configure an Installed Product Perform a Preinstallation Check View a Product Description Help
Select a task. Enter (?) to display option descriptions. It is highly recommended that you run the preinstallation check for all systems before installing a product. 5 If you select I, the list of products and options to install is displayed:
Storage Foundation and High Availability Solutions 5.0 1) Veritas Cluster Server 2) Veritas File System 3) Veritas Volume Manager 4) Veritas Volume Replicator 5) Veritas Storage Foundation 6) Veritas Storage Foundation for Oracle 7) Veritas Storage Foundation for DB2 8) Veritas Storage Foundation for Sybase 9) Veritas Storage Foundation Cluster File System 10) Veritas Storage Foundation for Oracle RAC 11) Veritas Cluster Management Console 12) Web Server for Storage Foundation Host Management 13) Symantec Product Authentication Service b) Back to previous menu Select a product to install: [1-13,b,q] q
Select b (back) to return to a previous section of an installation procedure. This feature is context-sensitive, so it returns to the beginning of a grouped section of questions. If an installation procedure hangs, use Controlc to stop and exit the program.
Enter the number of the product to install and press Return. Follow the instructions described in your product installation guide.
Installation options
The installer provides three installation options:
Install required packages Install required and optional packages Install additional packages to allow easy upgrade to higher product level
17
Before you begin an installation using a command-line script, read the product release notes and installation guide.
configure
enckeyfile encryption_key_file
encrypt password
installpkgs
license
logpath log_path
noextrapkgs
19
Table 3-1
nooptionalpkgs
nostart
patchpath patch_path
pkgpath package_path
precheck
requiredpkgs
Table 3-1
rsh
Specify this option when you want to use RSH and RCP for communication between systems instead of the default SSH and SCP. The -rsh option requires that systems be preconfigured so that commands between systems execute without prompting for passwords or confirmations. Specifies a directory other than /var/tmp as the working directory for the installation scripts. This destination is where initial logging is performed and where packages are copied on remote systems before installation.
tmppath tmp_path
Log files
After every product installation, the installer creates three text files:
The name and location of each file is displayed at the end of a product installation, and are always located in the /opt/VRTS/install/logs directory. It is recommended that you keep the files for auditing, debugging, and future use.
21
Mount the appropriate product software disc and go to the product_name/release_notes for release notes or the product_name/docs directory for installation guides. Note: Release notes and installation guides are not installed with the documentation packages. Veritas recommends that you copy them to the /opt/VRTS/docs directory so that they are available for future reference.
After a product documentation package is installed, access the user and administration guides under the /opt/VRTS/docs directory. Localized documentation packages are installed under the /opt/VRTS/docs/language_dir directory. The language_dir can be ja for Japanese, fr for French, or zh for simplified Chinese. Mount the Documentation disc, which contains all product guides and release notes.
Ordering documents
You can purchase hard copy software guides by contacting your salesperson or by ordering directly from the Veritas Web Store at: http://webstore.veritas.com.
Documentation feedback
Email comments about this guide to: sf_docs@symantec.com.
23
Component software
Symantec Product Authentication Service
The Symantec Product Authentication Service is a common Veritas feature that validates identities based on existing network operating system domains (such as NIS and NT) or private domains. The authentication service protects communication channels among Symantec application clients and services through message integrity and confidentiality services. Before you install the authentication service, read the Storage Foundation and High Availability Solutions appendix in the Symantec Product Authentication Service Installation Guide located at: authentication_service/docs/vxat_install.pdf Also read the installation guide an release notes for the product you are installing before selecting this method of setting up the authentication service.
25
Installation overview
Before you start the installation, read the Cluster Server release notes and installation guide:
cluster_server/release_notes/vcs_notes.pdf cluster_server/docs/vcs_install.pdf
Note: Cluster Server is included in all Veritas high availability (HA) products. If you have purchased a Veritas product suite that includes Cluster Server, it is installed and updated as part of that product suite. Do not install or update it as an individual component.
27
Installation overview
The high availability agents are in the cluster_server_agents directory. You cannot install or configure agents using the product installer. Before you start the installation, read the relevant agent installation and configuration guide:
Note: Agents are typically installed as part of a Storage Foundation product. For example, the high availability agent for Oracle is installed with the Storage Foundation for Oracle RAC product.
VCS version
4.0 p 4.1 p 5.0 s
Application
OS
8 9 s 10 s
DB2
Oracle
5.0
Sybase
5.0
s supported configuration
Refer to this table for supported application and operating system versions. Before configuring an high availability agent with VCS, verify that you have the latest agent version.
29
Installation overview
Before you start the installation, read the product release notes and installation guide:
volume_replicator/release_notes/vvr_notes.pdf volume_replicator/docs/vvr_install.pdf
Installation overview
Before you start the installation, read the component product release notes and installation guides:
Storage Foundation Standard Storage Foundation Standard HA Storage Foundation Enterprise Storage Foundation Enterprise HA
31
Table 3-3 lists the Veritas products and optionally licensed features available with each Storage Foundation version. Table 3-3 Storage Foundation offerings Products and features Veritas File System Veritas Volume Manager Optionally licensed features: Veritas Volume Replicator Option Storage Foundation Standard HA Veritas File System Veritas Volume Manager Veritas Cluster Server Optionally licensed features: Veritas Volume Replicator Option Storage Foundation Enterprise Veritas File System Veritas Volume Manager Optionally licensed features: Veritas Volume Replicator Option Storage Foundation Enterprise HA Veritas File System Veritas Volume Manager Veritas Cluster Server Optionally licensed features: Veritas Volume Replicator Option
Limited deployment
SF Basic deployment is limited to the following configurations:
Maximum four VxVM volumes per physical server (excluding system volumes required for booting root disks) Maximum four VxFS file systems per physical server (excluding root file systems) Maximum server capacity of two CPU sockets
Licensing
SF Basic includes a limited-use license. Customers must comply with the terms stated in the End-User License Agreement.
33
Technical support
Technical support is self-service only, available from the Veritas Support website. You can purchase additional support corresponding to the terms of the Storage Foundation Basic license. To access the self-service knowledge base, go to: http://support.veritas.com When contacting Support with questions relating to Storage Foundation Basic, be prepared to provide your product license key. You can determine your currently installed license by running the Veritas license report utility as shown in the following example:
# vxlicrep .... License Key Product Name
Installation overview
The Veritas Storage Foundation software is on the Veritas Storage Foundation Basic disc. You cannot install SF Basic if another Veritas Storage Foundation product is installed unless that product is first removed from the system. Read the Storage Foundation Installation Guide guide on the Storage Foundation Basic disc before starting the installation: storage_foundation/docs/sf_install.pdf
Upgrade paths
Storage Foundation Basic provides the following upgrade paths:
Upgrade from SF Basic to Storage Foundation Standard or Storage Foundation Enterprise simply by installing the appropriate license key. Upgrade from SF Basic to Storage Foundation Enterprise plus Veritas Volume Replicator by installing the appropriate license keys and products. Upgrade from SF Basic to any other Storage Foundation product by uninstalling SF Basic and installing the newly licensed product (see Installation methods on page 13).
To determine the release level of any Storage Foundation product installed on your system, run the vxlicrep command. See the Storage Foundation Installation Guide for more information on upgrades.
Installation overview
Before you start the installation, read the component product release notes and installation guides:
35
Installation overview
Before you start the installation, read the component product release notes and installation guides:
Installation overview
Before you start the installation, read the product release notes and installation guides:
37
Installation overview
Before you start the installation, read the component product release notes and installation guides:
Installation overview
Before you start the installation, read the component product release notes and installation guide:
Storage Foundation and High Availability Solutions Configuring SSH or RSH before installing products
39
Enabling SSH
The SSH program lets you log into and execute commands on a remote system. SSH enables encrypted communications and an authentication process between two untrusted hosts over an insecure network. SSH is the preferred method of remote communication because it provides a greater level of security than the RSH suite of protocols. Veritas recommends configuring a secure shell environment before installing any Veritas product. The following is an example SSH setup procedure. Note: Read the SSH documentation and online manual pages before enabling SSH. Visit the OpenSSH website for more information. Contact your OS support provider for issues regarding SSH configuration. For Solaris 8, SSH must be obtained from a third-party vendor. To enable SSH 1 2 Log in as root on the source system from which you want to install the Veritas product. To generate a DSA key pair on the source system, type the following: # ssh-keygen -t dsa System output similar to the following is displayed: Generating public/private dsa key pair. Enter file in which to save the key (//.ssh/id_dsa): Press Enter to accept the default location of /.ssh/id_dsa. System output similar to the following is displayed: Enter passphrase (empty for no passphrase): Do not enter a passphrase. Press Enter: Enter same passphrase again: Press Enter again.
40 Storage Foundation and High Availability Solutions Configuring SSH or RSH before installing products
Make sure the /.ssh directory is on all the target installation systems. If that directory is missing, create it on the target system and set the write permission to root only: # mkdir /.ssh # chmod go-w / # chmod 700 /.ssh # chmod go-rwx /.ssh Make sure the secure file transfer program (SFTP) is enabled on all the target installation systems. To enable SFTP, the /etc/ssh/sshd_config file must contain the following two lines: PermitRootLogin yes Subsystem sftp /usr/lib/ssh/sftp-server If the lines are not there, add them and restart SSH. To restart SSH on Solaris 10, type the following command: # svcadm restart ssh To restart on Solaris 9, type the following commands: # /etc/init.d/sshd stop # /etc/init.d/sshd start To copy the public DSA key, /.ssh/id_dsa.pub to each target system, type the following commands: # sftp target_sys If this is the first time this step is run on a system, output similar to the following displays: Connecting to target_sys... The authenticity of host 'target_sys (10.182.00.00)' can't be established. DSA key fingerprint is fb:6f:9e:61:91:9e:44:6b:87:86:ef:68:a6:fd:87:7d. Are you sure you want to continue connecting (yes/no)? Enter yes. Output similar to the following is displayed: Warning: Permanently added 'target_sys,10.182.00.00' (DSA) to the list of known hosts. root@target_sys password:
10 Enter the root password. 11 At the sftp prompt, type the following command: sftp> put /.ssh/id_dsa.pub The following output is displayed: Uploading /.ssh/id_dsa.pub to /id_dsa.pub 12 To quit the SFTP session, type the following command: sftp> quit
Storage Foundation and High Availability Solutions Configuring SSH or RSH before installing products
41
13 To begin the ssh session on the target system, type the following command: # ssh target_sys 14 Enter the root password at the prompt: password: 15 After logging in, enter the following command to append the authorization key to the id_dsa.pub file: # cat /id_dsa.pub >> /.ssh/authorized_keys 16 To delete the id_dsa.pub public key file after it is copied to the target (host) system and added to the authorized keys file, type the following command: # rm /id_dsa.pub 17 To log out of the ssh session, type the following command: # exit 18 When installing from a source system that is also an installation target, add the local system id_dsa.pub key to the local /.ssh/authorized_key file. The installation can fail if the installation source system is not authenticated. 19 Run the following commands on the source installation system. These commands bring the private key into the shell environment and makes the key globally available for the user root: # exec /usr/bin/ssh-agent $SHELL # ssh-add Identity added: /.ssh/identity This is a shell-specific step and is valid only while the shell is active. You must execute the procedure again if you close the shell during the session. 20 To verify that you can connect to the target system, type the following command: # ssh -l root target_sys uname -a The commands should execute on the remote system without the system requesting a passphrase or password.
42 Storage Foundation and High Availability Solutions Configuring SSH or RSH before installing products
If the service is enabled, the following line is displayed: enabled online svc:/network/login:rlogin If the service is not enabled, the following line is displayed: disabled disabled svc:/network/login:rlogin 2 3 4 To enable a disabled rsh/rlogin service, type the following command: # inetadm -e rlogin To disable an enabled rsh/rlogin service, type the following command: # inetadm -d rlogin Modify the .rhosts file. A separate .rhosts file is in the $HOME directory of each user and must be modified for each user who will remotely access the system using RSH. Each line of the .rhosts file contains a fully qualified domain name or IP address for each remote system having access to the local system. For example, if the root user must remotely access system1 from system2, you must add an entry for system2.companyname.com in the .rhosts file on system1. # echo "system2.companyname.com" >> $HOME/.rhosts After completing an installation procedure, delete the .rhosts file from each users $HOME directory to ensure security: # rm -f $HOME/.rhosts
43
Known issues
Before you install any product, read the following Veritas Technical Support TechNote for the latest information on updates, patches, and software issues regarding this release: http://support.veritas.com/docs/281987 To find information on supported hardware, see the hardware compatibility list (HCL) in the following TechNote: http://support.veritas.com/docs/283282